Katja Tuma

Orcid: 0000-0001-7189-2817

According to our database1, Katja Tuma authored at least 23 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Role of Gender in the Evaluation of Security Decisions.
IEEE Secur. Priv., 2024

Analyzing and Mitigating (with LLMs) the Security Misconfigurations of Helm Charts from Artifact Hub.
CoRR, 2024

2023
Checking security compliance between models and code.
Softw. Syst. Model., February, 2023

Delta Security Certification for Software Supply Chains.
IEEE Secur. Priv., 2023

A new, evidence-based, theory for knowledge reuse in security risk analysis.
Empir. Softw. Eng., 2023

Impact of Gender on the Evaluation of Security Decisions.
CoRR, 2023

2022
A replication of a controlled experiment with two STRIDE variants.
CoRR, 2022

Human Aspect of Threat Analysis: A Replication.
CoRR, 2022

The Role of Diversity in Cybersecurity Risk Analysis: An Experimental Plan.
Proceedings of the IEEE/ACM 3rd International Workshop on Gender Equality, 2022

Towards a Security Stress-Test for Cloud Configurations.
Proceedings of the IEEE 15th International Conference on Cloud Computing, 2022

Precise Analysis of Purpose Limitation in Data Flow Diagrams.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Finding security threats that matter: Two industrial case studies.
J. Syst. Softw., 2021

Seven Pain Points of Threat Analysis and Risk Assessment in the Automotive Domain.
IEEE Secur. Priv., 2021

2020
Secure Data-Flow Compliance Checks between Models and Code based on Automated Mappings.
Proceedings of the Software Engineering 2020, 2020

Automating the early detection of security design flaws.
Proceedings of the MoDELS '20: ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems, 2020

2019
Finding Security Threats That Matter: An Industrial Case Study.
CoRR, 2019

Towards Automated Security Design Flaw Detection.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2019

Flaws in Flows: Unveiling Design Flaws via Information Flow Analysis.
Proceedings of the IEEE International Conference on Software Architecture, 2019

Inspection guidelines to identify security design flaws.
Proceedings of the 13th European Conference on Software Architecture, 2019

2018
Threat analysis of software systems: A systematic literature review.
J. Syst. Softw., 2018

Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric Software Development Process.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Two Architectural Threat Analysis Techniques Compared.
Proceedings of the Software Architecture, 2018

2017
Towards Security Threats that Matter.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017


  Loading...